|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm70704839 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
060306s2005 inua ob 001 0 eng d |
040 |
|
|
|a UAB
|b eng
|e pn
|c UAB
|d OCLCE
|d OCLCQ
|d B24X7
|d UMI
|d IUL
|d C6I
|d OCLCQ
|d OCLCO
|d N$T
|d DEBSZ
|d OCLCQ
|d OCLCF
|d YDXCP
|d OCLCQ
|d COO
|d LIV
|d OCLCQ
|d OCLCA
|d REB
|d CEF
|d WYU
|d UAB
|d AU@
|d RDF
|d OCLCO
|d OCLCQ
|d INARC
|
019 |
|
|
|a 603545600
|a 606030789
|a 607730466
|a 786166479
|
020 |
|
|
|a 0764578014
|q (paper/website)
|
020 |
|
|
|a 9780764578014
|q (paper/website)
|
020 |
|
|
|a 9781461919254
|q (electronic bk.)
|
020 |
|
|
|a 1461919258
|q (electronic bk.)
|
024 |
3 |
|
|a 9780764578014
|
029 |
1 |
|
|a AU@
|b 000053224948
|
029 |
1 |
|
|a AU@
|b 000067090763
|
029 |
1 |
|
|a DEBBG
|b BV040901048
|
029 |
1 |
|
|a DEBSZ
|b 378282328
|
029 |
1 |
|
|a DEBSZ
|b 381370798
|
029 |
1 |
|
|a GBVCP
|b 785438009
|
029 |
1 |
|
|a UNITY
|b 075496704
|
035 |
|
|
|a (OCoLC)70704839
|z (OCoLC)603545600
|z (OCoLC)606030789
|z (OCoLC)607730466
|z (OCoLC)786166479
|
037 |
|
|
|a CL0500000133
|b Safari Books Online
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK5105.59
|b .D3 2005eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
4 |
|a The database hacker's handbook :
|b defending database servers /
|c David Litchfield [and others].
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley,
|c ©2005.
|
300 |
|
|
|a 1 online resource (xxviii, 500 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from title screen.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Why care about database security? -- The Oracle architecture -- Attacking Oracle -- Oracle : moving further into the network -- Securing oracle -- IBM DB2 Universal Database -- DB2 : discovery, attack, and defense -- Attacking DB2 -- Securing DB2 -- The Informix architecture -- Informix : discovery, attack, and defense -- Securing Informix -- Sybase architecture -- Sybase : discovery, attack, and defense -- Sybase : moving further into the network -- Securing Sybase -- MySQL architecture -- MySQL : discovery, attack, and defense -- MySQL : moving further into the network -- Securing MySQL -- Microsoft SQL Server architecture -- SQL Server : exploitation, attack, and defense -- Securing SQL Server -- The PostgreSQL architecture -- PostgreSQL : discovery and attack -- Securing PostgreSQL -- Example C Code for a time-delay SQL injection harness -- Dangerous extended stored procedures -- Oracle default usernames and passwords.
|
520 |
8 |
|
|a Annotation
|b Databases are the nerve center of our economy. Every piece of your personal information is stored there & ndash;medical records, bank accounts, employment history, pensions, car registrations, even your children & prime;s grades and what groceries you buy. Database attacks are potentially crippling & ndash;and relentless.<br /><br />In this essential follow & ndash;up to The Shellcoder & prime;s Handbook, four of the world & prime;s top security experts teach you to break into and defend the seven most popular database servers. You & prime;ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.<br /> & lowast; Identify and plug the new holes in Oracle and Microsoft(r) SQL Server<br /> & lowast; Learn the best defenses for IBM & prime;s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers<br /> & lowast; Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access<br /> & lowast; Recognize vulnerabilities peculiar to each database<br /> & lowast; Find out what the attackers already know<br /><br />Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download.
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Database security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Database security.
|2 fast
|0 (OCoLC)fst00888063
|
700 |
1 |
|
|a Litchfield, David,
|d 1975-
|4 aut
|
776 |
0 |
8 |
|i Print version:
|t Database hacker's handbook.
|d Indianapolis, Ind. : Wiley, ©2005
|w (DLC) 2005008241
|w (OCoLC)58789031
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780764578014/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Internet Archive
|b INAR
|n databasehackersh0000unse
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00005134
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 492745
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10250277
|
994 |
|
|
|a 92
|b IZTAP
|